Module 17 Flashcards
You recently created several new user accounts in the Sales OU and configured them with the appropriate group membership, logon scripts, and printer access. Except for one new sales employee, all employees are actively using the account. The remaining employee will be using the account within the next two weeks.
What is best practice for the remaining unused account?
Disable the account until the employee is ready to use it.
While researching a network issue, Randy discovered a diagram that he can use to see the design of the network.
What type of documentation did Randy discover?
Network Topology
A Windows user called the help desk to request that their local user account password be reset on their computer. The help desk technician connected to the computer using RDC and reset the password using the Network Places Wizard. After the password was reset, the user lost access to all the data files on the local HDD.
What is the most likely reason for the lost data files?
The user had previously encrypted their data files and folders using EFS
Becky has been assigned to help with a major change to her company’s accounts database. During the time of the change, Becky notices that her task will need to be modified to complete the change. Instead of telling her supervisor, she determines that the minor detail must have been overlooked and fixes what she believes is the problem. The minor detail that Becky did not tell her supervisor caused the change to fail.
What is Becky’s mistake called?
Out of scope modification
Several computers in your organization are being used from within the building after hours when the company is closed. Your manager has asked you to configure the computers to limit access to business hours.
What step can be taken to limit access to the computer?
Configure logon time restrictions
What security policy can be implemented to prevent removable media from automatically launching potentially harmful applications?
Disable AutoRun
One of your clients at work calls and is irate because they had to change their password and now, they can’t seem to find one that will match the strength needed for the company server. After they finish venting, you tell them you will send them the document that explains why they need to have a strong password.
What document will you send the client?
Password Policy
Allison’s computer is displaying a strange error message saying that Allison, who is an administrator, does not have access to a folder in the Documents library on her user account. Allison tried to take ownership of the folder but was still denied access. She tried running an antivirus scan on the folder, and again access to the folder was denied.
Which option can Allison employ to resolve the security issue?
Run a Windows Defender Offline scan.
Roger’s company is trying to increase the level of security for its network. Roger is researching ways to increase the security by making passwords more complex.
Which option can Roger change in Windows to require more complex passwords?
Password Policy
The users in the sales department need a central location on the network to share data files. All the client computers in the organization are running Windows 10 and have network and internet connectivity. The file server that hosts the network drive for the sales department is running Windows Server 2016.
What is the first step in implementing the data share?
Share the folder or volume on the file server that will store the shared data files
A technician is using the Security tab in the Properties dialog box in an attempt to remove the inherited status from a file’s permissions but cannot locate where to make the change.
What step would the technician take to make the change?
Click the Advanced button to open Advanced Security Settings for the file.
A technician is configuring the Windows computers on a network to print to a printer that is directly connected to the network via UTP cable.
What term best describes this method of printer connectivity?
Network printer
Currently James’s company is using RADIUS for AAA services to connect wireless users to the Windows Active Directory domain. However, the company wants to upgrade to a Cisco-based wireless network and would like to upgrade the older RADIUS.
Which option would James recommend as an upgrade to RADUIS?
TACACS+
As we configure the device and work with various settings to ensure the best quality environment possible, it is important to track and monitor various events so that if they need to be responded to, it can be done so in a timely manner.
Which of the following components of policies will allow for event-based monitoring?
Audit login failures
Zach believes someone is trying to log in to a computer system in order to gain access to the company’s network. He wants to use Windows to determine if that is the case.
Where can Zach go to check the security logs?
Event Viewer